Warning: Permanently added '10.128.1.60' (ECDSA) to the list of known hosts. 2020/02/08 04:22:51 parsed 1 programs 2020/02/08 04:22:53 executed programs: 0 syzkaller login: [ 62.300479][ T8607] IPVS: ftp: loaded support on port[0] = 21 [ 62.344376][ T8607] chnl_net:caif_netlink_parms(): no params data found [ 62.372899][ T8607] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.380221][ T8607] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.387716][ T8607] device bridge_slave_0 entered promiscuous mode [ 62.395888][ T8607] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.402991][ T8607] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.410665][ T8607] device bridge_slave_1 entered promiscuous mode [ 62.424870][ T8607] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.435173][ T8607] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.452672][ T8607] team0: Port device team_slave_0 added [ 62.459567][ T8607] team0: Port device team_slave_1 added [ 62.472368][ T8607] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.479451][ T8607] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.505878][ T8607] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.518047][ T8607] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.525086][ T8607] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.551028][ T8607] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.620903][ T8607] device hsr_slave_0 entered promiscuous mode [ 62.659619][ T8607] device hsr_slave_1 entered promiscuous mode [ 62.766770][ T8607] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 62.800861][ T8607] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 62.880811][ T8607] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 62.920704][ T8607] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 62.978829][ T8607] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.985969][ T8607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.993651][ T8607] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.000720][ T8607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.035228][ T8607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.046053][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.065924][ T2689] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.073609][ T2689] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.082313][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 63.093617][ T8607] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.103515][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.112178][ T3116] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.119252][ T3116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.140730][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.148930][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.156001][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.164226][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.173635][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.181982][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.190636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.200618][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.210487][ T8607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.226486][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.234368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.245219][ T8607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.261147][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.277685][ T8607] device veth0_vlan entered promiscuous mode [ 63.284904][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.293774][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.301365][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.312672][ T8607] device veth1_vlan entered promiscuous mode [ 63.328831][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 63.337547][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 63.345497][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.356662][ T8607] device veth0_macvtap entered promiscuous mode [ 63.366274][ T8607] device veth1_macvtap entered promiscuous mode [ 63.380397][ T8607] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.387686][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.398273][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.408741][ T8607] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.416234][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.425008][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/02/08 04:22:58 executed programs: 141 2020/02/08 04:23:03 executed programs: 329 2020/02/08 04:23:08 executed programs: 525 [ 79.514584][T11370] ================================================================== [ 79.522830][T11370] BUG: KASAN: use-after-free in vgem_gem_dumb_create+0x178/0x320 [ 79.530516][T11370] Read of size 8 at addr ffff8880a2294108 by task syz-executor.0/11370 [ 79.538716][T11370] [ 79.541037][T11370] CPU: 1 PID: 11370 Comm: syz-executor.0 Not tainted 5.5.0-syzkaller #0 [ 79.549444][T11370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.559478][T11370] Call Trace: [ 79.562742][T11370] dump_stack+0x1fb/0x318 [ 79.567084][T11370] print_address_description+0x74/0x5c0 [ 79.572602][T11370] ? vprintk_default+0x28/0x30 [ 79.577336][T11370] ? vprintk_func+0x158/0x170 [ 79.581984][T11370] ? printk+0x62/0x8d [ 79.585943][T11370] __kasan_report+0x149/0x1c0 [ 79.590592][T11370] ? vgem_gem_dumb_create+0x178/0x320 [ 79.595932][T11370] kasan_report+0x26/0x50 [ 79.600233][T11370] __asan_report_load8_noabort+0x14/0x20 [ 79.605835][T11370] vgem_gem_dumb_create+0x178/0x320 [ 79.611006][T11370] drm_mode_create_dumb_ioctl+0x22e/0x2a0 [ 79.616701][T11370] drm_ioctl_kernel+0x2cf/0x410 [ 79.621523][T11370] ? drm_mode_create_dumb+0x2a0/0x2a0 [ 79.626875][T11370] drm_ioctl+0x52f/0x890 [ 79.631089][T11370] ? drm_mode_create_dumb+0x2a0/0x2a0 [ 79.636436][T11370] ? do_vfs_ioctl+0x68f/0x1900 [ 79.641178][T11370] ? tomoyo_file_ioctl+0x23/0x30 [ 79.646087][T11370] ? drm_ioctl_kernel+0x410/0x410 [ 79.651141][T11370] __se_sys_ioctl+0x113/0x190 [ 79.655794][T11370] __x64_sys_ioctl+0x7b/0x90 [ 79.660360][T11370] do_syscall_64+0xf7/0x1c0 [ 79.664835][T11370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.670929][T11370] RIP: 0033:0x45b399 [ 79.674796][T11370] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.694375][T11370] RSP: 002b:00007fe65651bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 79.702759][T11370] RAX: ffffffffffffffda RBX: 00007fe65651c6d4 RCX: 000000000045b399 [ 79.710710][T11370] RDX: 0000000020000000 RSI: 00000000c02064b2 RDI: 0000000000000009 [ 79.718678][T11370] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 79.726628][T11370] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 79.734570][T11370] R13: 0000000000000285 R14: 00000000004d1598 R15: 000000000075bf2c [ 79.742527][T11370] [ 79.744827][T11370] Allocated by task 11370: [ 79.749220][T11370] __kasan_kmalloc+0x118/0x1c0 [ 79.753960][T11370] kasan_kmalloc+0x9/0x10 [ 79.758257][T11370] kmem_cache_alloc_trace+0x221/0x2f0 [ 79.763814][T11370] vgem_gem_dumb_create+0xd8/0x320 [ 79.768908][T11370] drm_mode_create_dumb_ioctl+0x22e/0x2a0 [ 79.774607][T11370] drm_ioctl_kernel+0x2cf/0x410 [ 79.779429][T11370] drm_ioctl+0x52f/0x890 [ 79.783642][T11370] __se_sys_ioctl+0x113/0x190 [ 79.788288][T11370] __x64_sys_ioctl+0x7b/0x90 [ 79.792849][T11370] do_syscall_64+0xf7/0x1c0 [ 79.797324][T11370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.803221][T11370] [ 79.805562][T11370] Freed by task 11370: [ 79.809604][T11370] __kasan_slab_free+0x12e/0x1e0 [ 79.814515][T11370] kasan_slab_free+0xe/0x10 [ 79.818988][T11370] kfree+0x10d/0x220 [ 79.822884][T11370] vgem_gem_free_object+0xb5/0xc0 [ 79.827875][T11370] drm_gem_object_put_unlocked+0x33a/0x4b0 [ 79.833648][T11370] vgem_gem_dumb_create+0x265/0x320 [ 79.838817][T11370] drm_mode_create_dumb_ioctl+0x22e/0x2a0 [ 79.844503][T11370] drm_ioctl_kernel+0x2cf/0x410 [ 79.849345][T11370] drm_ioctl+0x52f/0x890 [ 79.853562][T11370] __se_sys_ioctl+0x113/0x190 [ 79.858203][T11370] __x64_sys_ioctl+0x7b/0x90 [ 79.862790][T11370] do_syscall_64+0xf7/0x1c0 [ 79.867267][T11370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.873122][T11370] [ 79.875420][T11370] The buggy address belongs to the object at ffff8880a2294000 [ 79.875420][T11370] which belongs to the cache kmalloc-1k of size 1024 [ 79.889445][T11370] The buggy address is located 264 bytes inside of [ 79.889445][T11370] 1024-byte region [ffff8880a2294000, ffff8880a2294400) [ 79.902816][T11370] The buggy address belongs to the page: [ 79.908444][T11370] page:ffffea000288a500 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 [ 79.917524][T11370] flags: 0xfffe0000000200(slab) [ 79.922348][T11370] raw: 00fffe0000000200 ffffea00028a7748 ffffea000235ab48 ffff8880aa400c40 [ 79.930903][T11370] raw: 0000000000000000 ffff8880a2294000 0000000100000002 0000000000000000 [ 79.939486][T11370] page dumped because: kasan: bad access detected [ 79.945862][T11370] [ 79.948156][T11370] Memory state around the buggy address: [ 79.953801][T11370] ffff8880a2294000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.961842][T11370] ffff8880a2294080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.969875][T11370] >ffff8880a2294100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.977903][T11370] ^ [ 79.982200][T11370] ffff8880a2294180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.990231][T11370] ffff8880a2294200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.998277][T11370] ================================================================== [ 80.006304][T11370] Disabling lock debugging due to kernel taint [ 80.012898][T11370] Kernel panic - not syncing: panic_on_warn set ... [ 80.019466][T11370] CPU: 1 PID: 11370 Comm: syz-executor.0 Tainted: G B 5.5.0-syzkaller #0 [ 80.029149][T11370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.039181][T11370] Call Trace: [ 80.042444][T11370] dump_stack+0x1fb/0x318 [ 80.046752][T11370] panic+0x264/0x7a9 [ 80.050706][T11370] ? __kasan_report+0x193/0x1c0 [ 80.055528][T11370] ? trace_hardirqs_on+0x34/0x80 [ 80.060439][T11370] ? __kasan_report+0x193/0x1c0 [ 80.065265][T11370] __kasan_report+0x1b9/0x1c0 [ 80.069916][T11370] ? vgem_gem_dumb_create+0x178/0x320 [ 80.075273][T11370] kasan_report+0x26/0x50 [ 80.079593][T11370] __asan_report_load8_noabort+0x14/0x20 [ 80.085256][T11370] vgem_gem_dumb_create+0x178/0x320 [ 80.090561][T11370] drm_mode_create_dumb_ioctl+0x22e/0x2a0 [ 80.096259][T11370] drm_ioctl_kernel+0x2cf/0x410 [ 80.101081][T11370] ? drm_mode_create_dumb+0x2a0/0x2a0 [ 80.106429][T11370] drm_ioctl+0x52f/0x890 [ 80.110647][T11370] ? drm_mode_create_dumb+0x2a0/0x2a0 [ 80.116030][T11370] ? do_vfs_ioctl+0x68f/0x1900 [ 80.120770][T11370] ? tomoyo_file_ioctl+0x23/0x30 [ 80.125688][T11370] ? drm_ioctl_kernel+0x410/0x410 [ 80.130692][T11370] __se_sys_ioctl+0x113/0x190 [ 80.135345][T11370] __x64_sys_ioctl+0x7b/0x90 [ 80.139948][T11370] do_syscall_64+0xf7/0x1c0 [ 80.144429][T11370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 80.150290][T11370] RIP: 0033:0x45b399 [ 80.154161][T11370] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 80.173740][T11370] RSP: 002b:00007fe65651bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 80.182132][T11370] RAX: ffffffffffffffda RBX: 00007fe65651c6d4 RCX: 000000000045b399 [ 80.190087][T11370] RDX: 0000000020000000 RSI: 00000000c02064b2 RDI: 0000000000000009 [ 80.198029][T11370] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 80.205986][T11370] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 80.213932][T11370] R13: 0000000000000285 R14: 00000000004d1598 R15: 000000000075bf2c [ 80.223059][T11370] Kernel Offset: disabled [ 80.227374][T11370] Rebooting in 86400 seconds..